{"provider_url":"https://hatena.blog","published":"2013-02-19 20:08:30","blog_title":"IT\u3092\u3081\u3050\u308b\u6cd5\u5f8b\u554f\u984c\u306b\u3064\u3044\u3066\u8003\u3048\u308b","type":"rich","categories":["\u60c5\u5831\u6cd5"],"provider_name":"Hatena Blog","title":"\u60c5\u5831\u4fdd\u8b77\u539f\u5247","url":"https://cyberlawissues.hatenablog.com/entry/20130219/1361272110","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fcyberlawissues.hatenablog.com%2Fentry%2F20130219%2F1361272110\" title=\"\u60c5\u5831\u4fdd\u8b77\u539f\u5247 - IT\u3092\u3081\u3050\u308b\u6cd5\u5f8b\u554f\u984c\u306b\u3064\u3044\u3066\u8003\u3048\u308b\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","author_url":"https://blog.hatena.ne.jp/cyberlawissues/","width":"100%","author_name":"cyberlawissues","version":"1.0","image_url":null,"height":"190","description":"\u5404\u56fd\u3067\u60c5\u5831\u4fdd\u8b77\u306e\u539f\u5247\u3092\u63b2\u3052\u3066\u3044\u307e\u3059\u304c\u3001\u305d\u306e\u3046\u3061\u306e\u3044\u304f\u3064\u304b\u306b\u3064\u3044\u3066\u8a18\u8f09\u3057\u307e\u3059\u3002\u3010\uff11 \u307e\u305a\u306fOECD\uff18\u539f\u5247\uff08OECD\u2019s Eight Principles\uff09\u3011 Collection Limitation Principle \u53ce\u96c6\u5236\u9650\u306e\u539f\u5247 Data Quality Principle \u30c7\u30fc\u30bf\u5185\u5bb9\u306e\u539f\u5247 Purpose Specification Principle \u76ee\u7684\u660e\u78ba\u5316\u306e\u539f\u5247 Use Limitation Principle \u5229\u7528\u5236\u9650\u306e\u539f\u5247 Security Safeguards Principle \u5b89\u5168\u4fdd\u8b77\u306e\u539f\u5247 Openness Principle \u516c\u958b\u306e\u539f\u5247 Individual Pa\u2026","blog_url":"https://cyberlawissues.hatenablog.com/"}